When you install WebAccess from GW18 software on Windows server, it is pre-configured with self-signed certificates which does not fit your requirement and you want to replace with your existing official certificates.
There are two ways how to secure shipped tomcat-apache combo:
1. Securing java portion (using a keytool java based tool and .keystore certificate file).
2. Securing apache (web) portion (using openssl tool).
Please note that since those are two different tools/approaches, certificates which were generated for apache web servers cannot by used for securing tomcat just by simple replacing them.
Shipped tomcat-apache configuration uses the first option with a default self-signed certificate for a localhost.
A key file for desired configuration change is the "server.xml" located in C:\Novell\GroupWise\Tomcat\conf directory.
Using any text editor, you can find SSL configuration sections which you can enable or disable.
Alike said, by default a java/tomcat approach with the ".keystore" file located in C:\Novell\GroupWise\Tomcat\conf directory.
If you now want to switch from securing java portion into securing apache part, open the server.xml file by a text editor and search for
Then comment this section out by using starting tag <!-- and ending -->. This shall look like example bellow:
<Connector port="443" protocol="org.apache.coyote.http11.Http11NioProtocol"
maxThreads="150" SSLEnabled="true" scheme="https" secure="true">
Right below this tomcat/java secure section there is disabled traditional web server configuration section which you can enable by removing "<!--" and "-->" tags. In this statement, specify further your corporate key and certificate file names, example bellow:
<Connector port="443" protocol="org.apache.coyote.http11.Http11AprProtocol"
maxThreads="150" SSLEnabled="true" >
<UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" />
In this example a corporate private key and a certificate file were copied into the C:\Novell\GroupWise\Tomcat\conf directory. Once this is done, save changes and restart Apache Tomcat 8.5 Tomcat 8 service.
If such certificate switch between java and apache approach does not work for you (there are complains over certificates in catalina log file once you start tomcat-apache service ), then other way to try is import existing corporate certificates into the java`s ".keysore" file. Example bellow:
keytool -import -keyalg RSA -keystore <path to .keystore file> -trustcacerts -file <path to official corp cert file>
Naturally you would need to switch back from web/apache approach into tomcat/java security in the server.xml file.After those steps, you can restart Apache Tomcat 8.5 Tomcat 8 service to start using java/tomcat approach.
If nothing of above helps to get existing certificates for web working with this tomcat-apache combo, you will need to generate new CSR file and get certificates signed for your Windows server by the CA Authority where you purchased certificates before. Use preferably the "keytool" java utility to generate new CSR file and send it to the CA Authority asking to get certificates for securing java/tomcat.
Following is the command to generate new keystore and CSR files:
keytool -certreq -keyalg RSA -alias tomcat -file <certreq>.csr -keystore <path to new .keystore file>